25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

Email Incidents Reported by Survival Flight and Jacksonville Children’s Multispecialty Clinics
Oct25

Email Incidents Reported by Survival Flight and Jacksonville Children’s Multispecialty Clinics

Survival Flight, Inc., an emergency medical transportation company with bases in Alabama, Arkansas, Florida, Georgia, Illinois, Missouri, Oklahoma, and Tennessee, has identified a breach of its email environment. Suspicious activity was detected within its email system on May 22, 2024. Third-party digital forensics specialists were engaged to investigate the breach and confirmed there had been unauthorized access to several employee email accounts. The affected accounts were reviewed, and it was confirmed on August 19, 2024, that they contained sensitive patient information including names, medical histories, treatment information, health insurance information Social Security numbers, and financial information. The breach was recently reported to the HHS’ Office for Civil Rights as affecting 12,342 individuals. While the accounts were subjected to unauthorized access, no evidence has been found to indicate any misuse of patient data; however, the affected individuals have been advised to monitor their accounts and explanation of benefits statements for suspicious activity....

Read More
Henry Schein Confirms 166,000 Individuals Affected By October 2023 Ransomware Attack
Oct25

Henry Schein Confirms 166,000 Individuals Affected By October 2023 Ransomware Attack

Henry Schein, a Melville, NY-based provider of medical and dental supplies and Fortune 500 firm, has continued to investigate a 2023 cyberattack that affected its manufacturing and distribution businesses. The cyber incident was a ransomware attack where files were restored only for them to be encrypted by the ransomware group a second time. Initially, the investigation identified 29,112 individuals who had their data compromised in the attack, and notification letters started to be mailed to those individuals in November 2023. Since then, Henry Schein has been working with an outside expert to review the affected files – a process that has taken a considerable amount of time and resources and continued throughout the first half of the year. In an updated breach notification to the Maine Attorney General, Henry Schein confirmed that 166,432 individuals are now known to have been affected and had their personal and protected health information exposed or stolen. The additional individuals are now being notified and have been offered complimentary credit monitoring and identity...

Read More
White House Reviewing Proposed HIPAA Security Rule Update
Oct24

White House Reviewing Proposed HIPAA Security Rule Update

In December 2023, the Department of Health and Human Services published its Healthcare Sector Cybersecurity Strategy which outlined the steps that the HHS was planning to take to improve cybersecurity across the healthcare sector. The strategy included voluntary cybersecurity performance goals, which were published in January 2024, but voluntary goals alone were not believed to be sufficient to drive the cyber-related behavioral change that is needed across the healthcare sector. Consequently, HHS also planned an update to the Security Standards for the Protection of Electronic Protected Health Information (HIPAA Security Rule) to incorporate new cybersecurity requirements for HIPAA-regulated entities. The update was expected to be completed by Spring 2024; however, it was delayed. OCR Director Melanie Fontes Rainer confirmed earlier this year that work was underway on the update and that it should be released before the end of the year. The proposed update to the HIPAA Security Rule has now been completed and was passed to the Office of Information and Regulatory Affairs at the...

Read More
More Than 909,000 Individuals Affected by Cyberattack on New York IT Services Provider
Oct24

More Than 909,000 Individuals Affected by Cyberattack on New York IT Services Provider

ATSG Inc., an IT services company headquartered in New York, has recently reported a September 2024 data breach to the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) that involved the protected health information of 909,469 individuals. The breach was reported as a hacking/IT incident involving unauthorized access to a network server. It is currently unclear how many ATSG clients were affected, but one was Boston Children’s Health Physicians. Boston Children’s Health Physicians recently confirmed that it had fallen victim to a cyberattack through its IT vendor and said sensitive data was stolen in the attack. Boston Children’s Health Physicians has only released limited information about the attack and data breach at this stage but has confirmed that it was one of several clients of the IT vendor to be affected. Boston Children’s Health Physicians chose to issue its own notifications to the affected patients, which were sent around a month after the attack occurred. The BianLian threat group claimed responsibility for the attack and added Boston...

Read More
FortiManager Zero-Day Has Been Exploited Since July 2024
Oct24

FortiManager Zero-Day Has Been Exploited Since July 2024

A zero-day vulnerability in Fortinet’s FortiManager appliances is being mass exploited by at least one threat actor. The first known instance of exploitation was on June 27, 2024. The critical vulnerability is tracked as CVE-2024-47575 has been assigned a CVSS v3.1 severity score of 9.8.  The vulnerability, dubbed FortiJump by security researcher Kevin Beaumont, is due to missing authentication for a critical function in the FortiManager fgfmd daemon and allows an unauthenticated attacker to use a FortiManager device to execute arbitrary code or commands against vulnerable FortiManager devices. In order to successfully exploit the vulnerability, an attacker requires a valid Fortinet device certificate. The certificate could be obtained from an existing Fortinet device and could be reused for multiple attacks. According to Fortinet, attacks exploiting the vulnerability have involved an automated script that exfiltrates files from FortiManager. Those files contain IP addresses, credentials, and device configurations. So far, Fortinet has not detected any modified databases or...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist